WO2018138729A8 - Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet - Google Patents
Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet Download PDFInfo
- Publication number
- WO2018138729A8 WO2018138729A8 PCT/IL2018/050098 IL2018050098W WO2018138729A8 WO 2018138729 A8 WO2018138729 A8 WO 2018138729A8 IL 2018050098 W IL2018050098 W IL 2018050098W WO 2018138729 A8 WO2018138729 A8 WO 2018138729A8
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- establishing
- computing devices
- secure connection
- information packet
- electronic computing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3215—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/256—NAT traversal
- H04L61/2589—NAT traversal over a relay server, e.g. traversal using relay for network address translation [TURN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2592—Translation of Internet protocol [IP] addresses using tunnelling or encapsulation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/88—Medical equipments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/081—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying self-generating credentials, e.g. instead of receiving credentials from an authority or from another peer, the credentials are generated at the entity itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
- H04L61/2514—Translation of Internet protocol [IP] addresses between local and global IP addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/029—Firewall traversal, e.g. tunnelling or, creating pinholes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/77—Graphical identity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Disclosed is a computer-implemented method for establishing a secure connection between two electronic computing devices which are located in a network environment, the two electronic computing devices being a first computing device offering the connection and a second computing device designated to accept the connection, the method comprising executing, by at least one processor of at least one computer, a connection-establishing application for exchanging an information packet between the first computing device and the second computing device comprising a secret usable for establishing the connection, and evaluating a response from the second computing device for establishing the secure connection.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/303,214 US10686779B2 (en) | 2017-01-29 | 2018-01-29 | Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet |
| EP18703372.5A EP3430766B1 (en) | 2017-01-29 | 2018-01-29 | Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/IL2017/050103 WO2018138713A1 (en) | 2017-01-29 | 2017-01-29 | Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet |
| ILPCT/IL2017/050103 | 2017-01-29 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2018138729A1 WO2018138729A1 (en) | 2018-08-02 |
| WO2018138729A8 true WO2018138729A8 (en) | 2018-09-20 |
Family
ID=58231675
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IL2017/050103 Ceased WO2018138713A1 (en) | 2017-01-29 | 2017-01-29 | Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet |
| PCT/IL2018/050098 Ceased WO2018138729A1 (en) | 2017-01-29 | 2018-01-29 | Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IL2017/050103 Ceased WO2018138713A1 (en) | 2017-01-29 | 2017-01-29 | Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet |
Country Status (3)
| Country | Link |
|---|---|
| US (3) | US11218465B2 (en) |
| EP (1) | EP3430766B1 (en) |
| WO (2) | WO2018138713A1 (en) |
Families Citing this family (49)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8903973B1 (en) | 2008-11-10 | 2014-12-02 | Tanium Inc. | Parallel distributed network management |
| US11172470B1 (en) | 2012-12-21 | 2021-11-09 | Tanium Inc. | System, security and network management using self-organizing communication orbits in distributed networks |
| WO2015147779A1 (en) * | 2014-03-24 | 2015-10-01 | Hewlett-Packard Development Company, L.P. | Monitoring for authentication information |
| US10873645B2 (en) | 2014-03-24 | 2020-12-22 | Tanium Inc. | Software application updating in a local network |
| US11461208B1 (en) | 2015-04-24 | 2022-10-04 | Tanium Inc. | Reliable map-reduce communications in a decentralized, self-organizing communication orbit of a distributed network |
| US11886229B1 (en) | 2016-03-08 | 2024-01-30 | Tanium Inc. | System and method for generating a global dictionary and performing similarity search queries in a network |
| US11609835B1 (en) | 2016-03-08 | 2023-03-21 | Tanium Inc. | Evaluating machine and process performance in distributed system |
| US11153383B2 (en) | 2016-03-08 | 2021-10-19 | Tanium Inc. | Distributed data analysis for streaming data sources |
| US10929345B2 (en) | 2016-03-08 | 2021-02-23 | Tanium Inc. | System and method of performing similarity search queries in a network |
| US11372938B1 (en) | 2016-03-08 | 2022-06-28 | Tanium Inc. | System and method for performing search requests in a network |
| WO2018138713A1 (en) | 2017-01-29 | 2018-08-02 | Beame. Io Ltd. | Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet |
| CN110809879B (en) * | 2017-06-28 | 2021-04-27 | 株式会社OPTiM | A kind of Web conference sound assistant system, method and program |
| US10824729B2 (en) | 2017-07-14 | 2020-11-03 | Tanium Inc. | Compliance management in a local network |
| US10834170B2 (en) * | 2018-03-19 | 2020-11-10 | Citrix Systems, Inc. | Cloud authenticated offline file sharing |
| FR3083887B1 (en) * | 2018-07-11 | 2020-11-27 | Wallix | METHOD AND DEVICE FOR DETECTION OF COMPROMISE OF A TARGET BY A LATERAL ATTACK |
| US11343355B1 (en) * | 2018-07-18 | 2022-05-24 | Tanium Inc. | Automated mapping of multi-tier applications in a distributed system |
| US10841365B2 (en) * | 2018-07-18 | 2020-11-17 | Tanium Inc. | Mapping application dependencies in a computer network |
| US11288347B2 (en) * | 2019-03-07 | 2022-03-29 | Paypal, Inc. | Login from an alternate electronic device |
| EP3942735B1 (en) * | 2019-03-20 | 2025-10-08 | Dfinity Stiftung | Distributed network with blinded identities |
| WO2020197547A1 (en) * | 2019-03-27 | 2020-10-01 | Xinova, LLC | Detection of deep fake videos based on digital signature |
| US11483143B2 (en) * | 2019-04-15 | 2022-10-25 | Smart Security Systems, Llc | Enhanced monitoring and protection of enterprise data |
| EP3734902A1 (en) * | 2019-04-29 | 2020-11-04 | Siemens Aktiengesellschaft | Method and system for allocating publicly trusted certificates, engineering or management system and technical equipment |
| EP4035035A4 (en) * | 2019-09-25 | 2023-10-04 | Commonwealth Scientific and Industrial Research Organisation | CRYPTOGRAPHIC SERVICES FOR BROWSER APPLICATIONS |
| US11831670B1 (en) | 2019-11-18 | 2023-11-28 | Tanium Inc. | System and method for prioritizing distributed system risk remediations |
| US11589226B2 (en) * | 2019-12-17 | 2023-02-21 | Cisco Technology, Inc. | Multi-factor authentication for mobile security protocol |
| US11489686B2 (en) | 2020-01-14 | 2022-11-01 | Citrix Systems, Inc. | Virtual meetings in ad-hoc networks |
| CN113225188B (en) * | 2020-01-19 | 2023-09-22 | 华为技术有限公司 | Login authentication method, device and system |
| US11012233B1 (en) * | 2020-01-22 | 2021-05-18 | Coinplug, Inc. | Method for providing authentication service by using decentralized identity and server using the same |
| US11310059B2 (en) * | 2020-06-02 | 2022-04-19 | Microsoft Technology Licensing, Llc | Ephemeral cryptography keys for authenticating computing services |
| CN111787131B (en) * | 2020-06-24 | 2023-02-21 | 百度在线网络技术(北京)有限公司 | ID generation method and electronic device |
| US11563764B1 (en) | 2020-08-24 | 2023-01-24 | Tanium Inc. | Risk scoring based on compliance verification test results in a local network |
| EP4226571A4 (en) * | 2020-10-09 | 2023-11-01 | Visa International Service Association | TOKEN SECURITY SYSTEM AND METHOD |
| CN112492004B (en) * | 2020-11-17 | 2023-02-17 | 深圳市晨北科技有限公司 | Method, device, system and storage medium for establishing local communication link |
| DE202021100647U1 (en) * | 2021-02-10 | 2021-02-17 | Biotronik Se & Co. Kg | Personal data anonymization system (PDAS) with customer-specific token |
| US12278913B2 (en) | 2021-05-11 | 2025-04-15 | Metalinxx, Inc. | Apparatus and methods for management of controlled objects |
| US11477027B1 (en) | 2021-05-11 | 2022-10-18 | Dennis Palatov | Apparatus and methods for management of controlled objects |
| CN115604221A (en) * | 2021-06-25 | 2023-01-13 | 中兴通讯股份有限公司(Cn) | Information processing method, intermediate resolver, network device and storage medium |
| US12231467B1 (en) | 2021-10-19 | 2025-02-18 | Tanium Inc. | System and method for deputizing satellite endpoints |
| US12423453B2 (en) * | 2021-12-24 | 2025-09-23 | Intel Corporation | Methods and apparatus to control access to user data based on user-specified attributes |
| US12225111B2 (en) * | 2022-03-08 | 2025-02-11 | SanDisk Technologies, Inc. | Authorization requests from a data storage device to multiple manager devices |
| US12265167B2 (en) | 2022-06-27 | 2025-04-01 | Samsung Electronics Co., Ltd. | Wireless receive signal strength indicator (RSSI)-based positioning |
| EP4293676A1 (en) * | 2022-11-02 | 2023-12-20 | Siemens Healthcare GmbH | Medical imaging device and method for providing a user interface for a medical accessory device |
| US20240154808A1 (en) * | 2022-11-03 | 2024-05-09 | Change Healthcare Holdings, Llc | Systems and methods of trace id validation and trust |
| US11943195B1 (en) * | 2023-01-20 | 2024-03-26 | Microsoft Technology Licensing, Llc | Zero-trust DNS and FQDN based traffic acquisition using synthetic IP |
| US12452046B2 (en) * | 2023-04-21 | 2025-10-21 | Jpmorgan Chase Bank, N.A. | Systems and methods for secure cryptographic secret distribution |
| US20240364665A1 (en) * | 2023-04-27 | 2024-10-31 | International Business Machines Corporation | Securing access to a virtual machine via a service processor using a key |
| GB202308438D0 (en) * | 2023-06-06 | 2023-07-19 | Mastercard International Inc | Secure payment communications network |
| US12368756B2 (en) * | 2023-07-19 | 2025-07-22 | Capital One Services, Llc | Secondary data encryption via browser extension |
| US12093368B1 (en) * | 2023-08-31 | 2024-09-17 | Transparent Technologies, Inc. | Zero trust system and method for securing data |
Family Cites Families (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7181017B1 (en) * | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
| US7769997B2 (en) * | 2002-02-25 | 2010-08-03 | Network Resonance, Inc. | System, method and computer program product for guaranteeing electronic transactions |
| WO2008096825A1 (en) * | 2007-02-07 | 2008-08-14 | Nippon Telegraph And Telephone Corporation | Certificate authenticating method, certificate issuing device, and authentication device |
| US9078128B2 (en) * | 2011-06-03 | 2015-07-07 | Apple Inc. | System and method for secure identity service |
| US8843740B2 (en) * | 2011-12-02 | 2014-09-23 | Blackberry Limited | Derived certificate based on changing identity |
| US20140298415A1 (en) * | 2013-03-28 | 2014-10-02 | Research In Motion Limited | Method and system for providing connectivity for an ssl/tls server behind a restrictive firewall or nat |
| SG10201806366TA (en) * | 2015-03-25 | 2018-08-30 | Sixscape Communications Pte Ltd | Apparatus and method for managing digital certificates |
| US10826905B2 (en) * | 2016-12-05 | 2020-11-03 | Citrix Systems, Inc. | Secure access to on-premises web services from multi-tenant cloud services |
| WO2018138713A1 (en) | 2017-01-29 | 2018-08-02 | Beame. Io Ltd. | Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet |
-
2017
- 2017-01-29 WO PCT/IL2017/050103 patent/WO2018138713A1/en not_active Ceased
- 2017-01-29 US US16/467,779 patent/US11218465B2/en active Active
-
2018
- 2018-01-29 US US16/303,214 patent/US10686779B2/en active Active
- 2018-01-29 EP EP18703372.5A patent/EP3430766B1/en active Active
- 2018-01-29 WO PCT/IL2018/050098 patent/WO2018138729A1/en not_active Ceased
-
2021
- 2021-12-23 US US17/561,142 patent/US11711355B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| WO2018138729A1 (en) | 2018-08-02 |
| US11711355B2 (en) | 2023-07-25 |
| EP3430766B1 (en) | 2019-07-24 |
| US20200053072A1 (en) | 2020-02-13 |
| US11218465B2 (en) | 2022-01-04 |
| WO2018138713A1 (en) | 2018-08-02 |
| US20200067914A1 (en) | 2020-02-27 |
| US10686779B2 (en) | 2020-06-16 |
| US20220191190A1 (en) | 2022-06-16 |
| EP3430766A1 (en) | 2019-01-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2018138729A8 (en) | Establishing an ad-hoc secure connection between two electronic computing devices using a self-expiring locally transmitted information packet | |
| MY191655A (en) | Method for controlling transmission of data | |
| MY190550A (en) | Method and device for processing service request | |
| WO2014195501A3 (en) | Electronic authentication systems | |
| EP3806514A8 (en) | Screen-analysis based device security | |
| MX2016004033A (en) | Bank transfer processing method and device. | |
| GB2533727A (en) | Registry apparatus, agent device, application providing apparatus and corresponding methods | |
| CL2007001510A1 (en) | Methods and client computing devices that allow delegating user credentials from the client computing device to a server computing device in a computer network, eventually in a single connection, and obtaining secure resources from the server. | |
| GB2523284A (en) | Communication channel failover in a high performance computing (HPC) network | |
| EP4513367A3 (en) | Semi-active probing framework to gather threat intelligence for encrypted traffic and learn about devices | |
| GB2541572A (en) | Applications of secured memory areas and secure environments in policy-based access control systems for mobile devices | |
| PH12018501668A1 (en) | Electronic payment service processing method and device, and electronic payment method and device | |
| GB201121449D0 (en) | Phishing processing method and system and computer readable storage medium applying the method | |
| WO2014182787A3 (en) | Systems and methods for high fidelity multi-modal out-of-band biometric authentication | |
| ATE540519T1 (en) | METHOD AND APPARATUS FOR SHARING COMMON-INTEREST CONNECTIONS BETWEEN COMMUNICATION DEVICES | |
| WO2019007336A3 (en) | Data processing method, apparatus and device | |
| GB2508529A (en) | Bios network access | |
| WO2018057604A8 (en) | System and methods for point to point encryption and tokenization using a mobile device | |
| EP4246892A3 (en) | Method and system for controlling the exchange of privacy-sensitive information | |
| GB2509647A (en) | Testing transaction applications | |
| NZ702250A (en) | Network based management of protected data sets | |
| MX2017008163A (en) | Techniques for contextual mobile data access. | |
| EP3633574A4 (en) | Data structure, transmission device, receiving device, settlement device, method, and computer program | |
| HK1215747A1 (en) | Transparently routing job submissions between disparate environments | |
| TW201711736A (en) | Information distribution methods, computer readable media, and information distribution servers |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 2018703372 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 2018703372 Country of ref document: EP Effective date: 20181016 |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18703372 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |